TY - JOUR
T1 - Provably secure authenticated key exchange protocols for low power computing clients
AU - Wen, Hsiang An
AU - Lin, Chun Li
AU - Hwang, Tzonelih
PY - 2006/3
Y1 - 2006/3
N2 - Low power computing devices such as cellular phones, PDAs, and smart cards are very popular and widely used by people nowadays. To secure communications between a client and a server through a low power computing device, several AKE-LPC (Authenticated Key Exchange - for Low Power Computing clients) protocols have been proposed recently. This paper proposes a new efficient AKE-LPC protocol, which requires the client to perform only one hash operation during the execution phase. An augmented protocol which can additionally provide explicit mutual authentication is also presented. Furthermore, the security of the proposed protocols is formally proven in the random oracle model.
AB - Low power computing devices such as cellular phones, PDAs, and smart cards are very popular and widely used by people nowadays. To secure communications between a client and a server through a low power computing device, several AKE-LPC (Authenticated Key Exchange - for Low Power Computing clients) protocols have been proposed recently. This paper proposes a new efficient AKE-LPC protocol, which requires the client to perform only one hash operation during the execution phase. An augmented protocol which can additionally provide explicit mutual authentication is also presented. Furthermore, the security of the proposed protocols is formally proven in the random oracle model.
UR - http://www.scopus.com/inward/record.url?scp=33644748254&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33644748254&partnerID=8YFLogxK
U2 - 10.1016/j.cose.2005.09.010
DO - 10.1016/j.cose.2005.09.010
M3 - Article
AN - SCOPUS:33644748254
SN - 0167-4048
VL - 25
SP - 106
EP - 113
JO - Computers and Security
JF - Computers and Security
IS - 2
ER -